Skip to content

Commit 90e7418

Browse files
authored
Merge pull request #14 from certtools/main
publish
2 parents 498120a + afc77b3 commit 90e7418

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,9 @@ Security analysis of the defo2 project + HOWTO for web admins
44

55
Rendered version: https://certtools.github.io/defo-security-analysis/
66

7+
PDF Version: https://certtools.github.io/defo-security-analysis/document.pdf
8+
9+
710
## Deliverable text
811

912
Deployment Scenarios Analysis: there are many variations in how ECH can be deployed and the varying relationships between the client and server entities involved. There therefore remains a need to map out residual privacy leaks in such scenarios and how to plug those, given the existence of additional privacy mechanisms such as Qname Minimization, Oblivious DNS-over-HTTPS, and MASQUE.
@@ -40,10 +43,7 @@ cd report
4043
mkdocs serve
4144
```
4245

43-
Note well: we publish the documentation under github pages.
46+
or just ``make build && make serve``
4447

45-
## Table of contents
48+
Note well: we publish the documentation under github pages.
4649

47-
- [Overview what we are going to analyse](analysis_plan.md)
48-
- [Clients](Clients.md) -
49-
- [Weaknesses in ECH in combination with WKECH](wkech-considerations.md)

report/clients/browsers.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ Modern web browsers are notably permissive toward emerging standards, often prio
44

55
The browser Firefox adopted DoH as their default setting, reverting back to Do53 should a DoH connection fail to establish.
66
The Browsers Chrome and Edge use DoH if the system's default resolver supports it.
7-
Opera, Brave and Vivaldi do not use DoH by defaut.
7+
Opera, Brave and Vivaldi do not use DoH by default.
88

99
DoH connection failures can arise from active downgrade attacks, where malicious entities intercept and manipulate traffic.
10-
Consequently, the usage of ECH can be silently thwarted if an attacker holds sway the network path between the user and the intended DoH server or between recursive and autoritative DNS server.
10+
Consequently, the usage of ECH can be silently thwarted if an attacker holds sway the network path between the user and the intended DoH server or between recursive and authoritative DNS server.
1111
An attacker with control over the network connection can though also block TLS and other security measures, but not without alarm bells going off in the browser and other clients.
1212

1313
For the implementation of ECH, attention must not only be paid to pure HTTPS traffic but also to other communication channels such as WebRTC and network proxies, as neglecting ECH on these channels can introduce ways for de-anonymization.

report/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This "skeptical"/outside view helps to ask hard questions and identify potential
3939

4040
By releasing this report we aim to improve future versions.
4141

42-
It is clear that - given such widely used code and protocol stacks as with HTTP/HTTPS, changing things is very hard. ECH tries to achieve the maximum possible, given lots of constraints by the protocol landscape, implementors, etc. Hence, ECH has to live with all the legacy issues. It's probably not possible to find a quick, elegant and 100% compatible solution for the problem which ECH is trying to address.
42+
It is clear that - given such widely used code and protocol stacks as with HTTP/HTTPS, changing things is very hard. ECH tries to achieve the maximum possible, given lots of constraints by the protocol landscape, implementers, etc. Hence, ECH has to live with all the legacy issues. It's probably not possible to find a quick, elegant and 100% compatible solution for the problem which ECH is trying to address.
4343
ECH being a complex solution is inherent - RFC8744 provides lots of background for these matters.
4444

4545
Finally, we acknowledge that ECH is an incremental update step and we assume there will be an incremental roll-out of ECH globally. This has multiple implications:

0 commit comments

Comments
 (0)